2min chapter

Security Cryptography Whatever cover image

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong

Security Cryptography Whatever

CHAPTER

ATT&CK2 Attack

ATT&CK2 is able to register the servers' public key as a user's public key by tricking the victim into sending a carefully crafted message in the ETE protocol and enables it to permanently impersonate the victim. This is a fun cross-particle attack between the C2S, aka the TLS-like client to server protocol and the actual end-to-end encrypted messaging protocol underneath it. The idea is that whenever you receive a message, if there is a metadata box, the values contained within the metadata box will overwrite the values outside.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode